Tuesday, November 6, 2012

Trojan Horse Virus

The name "trojan" comes from the ancient Greek legend of the trojan horse. The "trojan horse" program is a popular virus file. It is not self-propagating to infect other files. Usually, trojans are disguised to attract users to download them. Once a user opens the particular file, it plants a trojan virus. Hackers can then use the security hole to remote access users' computers, monitor user behavior and even transfer data.

Trojans work in a way that is similar to remote access, the difference is trojan horses can obtain the permission of the computer, without users' right. The program capacity is very light and small, and runs with resources and bandwidth. It is difficult for computers without anti-virus software to detect it, and stop its actions. It automatically runs each time Windows loads, immediately changes the file name, can even be invisible, or immediately auto copies to another folder, stopping users from running the antivirus.

In order to prevent detection of the trojan, hackers usually encrypt the packet file. When the trojan runs and connects to the user's computer, the hacker is able to get most of the server operating authority, such as copying files, deleting files, modifying the registry, and changing the system configuration of the user's computer. There are two types of trojans - universal and transitive. Universal trojan horses can be controlled, but you cannot control transitive ones.

Trojan technology develops rapidly, mainly because of youngsters who are curious or eager to show their skills. So far, trojans have gone through six generations of improvements:

The first generation is the most original. Simple password theft by sending a trojan via e-mail and waiting for users to respond to the e-mail.

Second generation trojans have made great progress in technology. Glacier is one of the typical representatives of China's trojans.

With major improvements in data transfer technology, third generation trojans are ICMP types that use malformed packet transmission data, increasing the difficulty for antiviruses to identify the software.

The greatly changed fourth generation is a hidden process, using a plug-in kernel to remote and insert threading technology to DLL thread, or articulated PSAPI.

The fifth generation is a hard drive stage trojan. This trojan uses Rootkit technology to achieve hidden depth, then infects the hard drive and attacks the anti-virus software and network firewalls, so they lose their self protection effect. Some hard drive level trojans can lock BIOS, making it more difficult to remove.

13 comments:

  1. Good post. sharing valuable information about Trojan Horse Virus guide

    ReplyDelete
  2. A huge number of PC frameworks worldwide have as of now turn into the casualties of infection assaults and numerous more will keep on being if individuals stay ignorant about it. They are intense however with the support of antivirus programming you can without a doubt stop them from your framework. With the expansion in the use of the Internet these malignant projects have expanded in number and recurrence too.this website

    ReplyDelete
  3. There are certainly a lot of details like that to take into consideration. That is a great point to bring up. I offer the thoughts above as general inspiration but clearly there are questions like the one you bring up where the most important thing will be working in honest good faith. I don?t know if best practices have emerged around things like that, but I am sure that your job is clearly identified as a fair game. Both boys and girls feel the impact of just a moment?s pleasure, for the rest of their lives
    download trOjen horse remover 2018 Cracked keygen

    ReplyDelete
  4. Such an amazing post you have shared here about trojan horse virus. In this post, you have given some detailed information about this type of virus which is really good. If you are looking for best Network Security Charlotte solutions, you have a good choice about Enter-sys.

    ReplyDelete
  5. I am definitely enjoying your website. You definitely have some great insight and great stories. get quote

    ReplyDelete
  6. Share great information about your blog , Blog really helpful for us . Sophos antivirus Brisbane

    ReplyDelete
  7. Nice article, which you have shared here. Your article is very informative and I liked your way to express your views in this post. The article you have shared here is very informative and the points you have mentioned are very helpful. Thanks for sharing this article here. Network security audit company

    ReplyDelete
  8. Hi everyone, it’s my first visit at this web site, and piece of writing is really fruitful for me, Quality content is the key to invite the users to go to see the site, that’s what this website is providing. Keep up posting these articles or reviews. You can also visit how to install k7 antivirus for more related information and knowledge.

    ReplyDelete
  9. For many people, this is the best solution here see how to do it.
    Network Security Test

    ReplyDelete
  10. This article is an appealing wealth of informative data that is interesting and well-written. keep posting. enterprise security assessment/

    ReplyDelete
  11. The representation of this article is actually superb. I think this is a genuinely beneficial and instructive article for everyone, I appreciate this kind of writing, Thankful to you for sharing an article like this.Hire A Cell Phone Hacker

    ReplyDelete
  12. With a prepaid International IoT SIM card, you can manage your budget without worrying about overspending. This will earn you the admiration of whoever handles the company's finances. Your cash flow won't take a nosedive due to an unexpected bill full of outrageous roaming costs. You won't need to worry about coming up with the cash to pay your phone bill.

    ReplyDelete
  13. Data SIM cards are often used in devices that primarily rely on mobile data, such as tablets or dedicated mobile data routers. They can be particularly useful for travelers who need internet access on the go, as they provide a dedicated data connection without the need for voice or SMS capabilities.

    ReplyDelete